19-01-2013, 09:55 AM
CYBER CRIME AND SECURITY
CYBER CRIME.docx (Size: 36.71 KB / Downloads: 66)
ABSTRACT:-
Cyber world involved in transmission and storing of data through secure line of transmission and retrival.Miscreants who intent to secure this data via illegal ways try to hack in or brake in to data bases and transmission lines increases the use of internet has brought up to increase in the rate of social ethics and etiquette visitors terms i.e. age group and write in getting access to vulgar and impropriate content on the Internet. The Security in terms of private or national Importance is last totally to other hands were the access to highly confidential file and content is used in the wrong direction the involvement of Internet and Intranet makes it easy for the one who really interested to misuse them. The Primary step in Cyber crime is hacking into other computer or personalized data were hacking makes the entire job easy, were the main basic frame of the entire establishment of the particular data is corrupted and new path is made to get the access. This imposes said to the security of low and high level of confidentiality.
INTRODUCTION:-
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
REASON FOR CYBER CRIME:-
In this the “ The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. Applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be:
Capacity to store data in comparatively small space- computer has unique characteristic of storing data in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much more easier.
Easy to access-The problem encountered in guarding a computer system from unauthorised access is that there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that bypass firewalls can be utilized to get past many a security system.
Complex-The computers work on os and these os in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.
Negligence-It is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.
Loss of evidence- Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
CYBERCRIMES:-
Children and adolescents between the age group of 6 – 18 years –The simple reason for this type of delinquent behaviour pattern in children is seen mostly due to the inquisitiveness to know and explore the things. Other cognate reason may be to prove themselves to be outstanding amongst other children in their group. Further the reasons may be psychological even. E.g. the Bal Bharati (Delhi) case was the outcome of harassment of the delinquent by his friends.
Organised hackers-These kinds of hackers are mostly organised together to fulfil certain objective. The reason may be to fulfil their political bias, fundamentalism, etc. The Pakistanis are said to be one of the best quality hackers in the world. They mainly target the Indian government sites with the purpose to fulfil their political objectives. Further the NASA as well as the Microsoft sites is always under attack by the hackers.
Professional hackers / crackers –Their work is motivated by the colour of money. These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information. Further they are ven employed to crack the system of the employer basically as a measure to make it safer by detecting the loopholes.
implanted logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that bypass firewalls can be utilized to get past many a security system.
Complex-The computers work on os and these os in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.
Negligence-It is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.
Loss of evidence- Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
CYBERCRIMES:-
Children and adolescents between the age group of 6 – 18 years –The simple reason for this type of delinquent behaviour pattern in children is seen mostly due to the inquisitiveness to know and explore the things. Other cognate reason may be to prove themselves to be outstanding amongst other children in their group. Further the reasons may be psychological even. E.g. the Bal Bharati (Delhi) case was the outcome of harassment of the delinquent by his friends.
Organised hackers-These kinds of hackers are mostly organised together to fulfil certain objective. The reason may be to fulfil their political bias, fundamentalism, etc. The Pakistanis are said to be one of the best quality hackers in the world. They mainly target the Indian government sites with the purpose to fulfil their political objectives. Further the NASA as well as the Microsoft sites is always under attack by the hackers.
Professional hackers / crackers –Their work is motivated by the colour of money. These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information. Further they are ven employed to crack the system of the employer basically as a measure to make it safer by detecting the loopholes.